All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Study Help
New
Search
Search
Sign In
Register
study help
business
accounting information systems
Questions and Answers of
Accounting Information Systems
Miller had a framed T-shirt in his office that said,“He who dies with the most toys wins.” What does this tell you about Miller? What lifestyle red flags could have tipped off the company to the
What pressures motivated Miller to embezzle? How did Miller rationalize his actions?
Explain the three elements of the Opportunity Triangle (commit, conceal, convert), and discuss how Miller accomplished each when embezzling funds from Associated Communications. What specific
How does Miller fit the profile of the average fraud perpetrator? How does he differ? How did these characteristics make him difficult to detect?
Which of the following statements is (are) TRUE?a. The type of computer fraud that is simplest and most common and that requires the least amount of skill is data fraud.b. The type of computer fraud
A group of immigrants moved from town to town in the Pacific Northwest perpetrating the same fraud. An advanced member of the group obtained a paycheck from the largest employer in the town by paying
Cyber sleuths need which of the following skills?a. Ability to do complex programming, so they can develop their own software to examine corporate data and recordsb. Ability to follow a trail, think
The number of incidents and the total dollar losses from computer fraud are increasing rapidly for which of the following reasons?a. Many instances of computer fraud go undetected and many computer
Which of the following statements is (are) TRUE?a. Perpetrators who do not steal cash or use the stolen assets usually convert the assets to a spendable form.b. The biggest fraud opportunity arises
Which of the following statements is (are) TRUE?a. To prevent detection when an asset is stolen, the perpetrator must inflate liabilities or decrease assets.b. Committing a fraud almost always takes
Which of the following statements is (are) TRUE about computer fraud perpetrators?a. They are typically younger and are motivated by curiosity, the challenge of beating the system, and gaining
SAS No. 99 requires auditors to .a. understand fraud and why it is committedb. limit discussion among audit team members of how and where the company’s financial statements have been susceptible to
Which of the following actions did the Treadway Commission recommend to reduce fraudulent financial reporting?a. Establish financial incentives that promote integrity in the financial reporting
In a typical misappropriation, the perpetrator .a. gains the trust or confidence of the entity being defraudedb. uses trickery, cunning, or false or misleading information to commit fraudc. does not
Why do fraudulent acts often go unreported and are therefore not prosecuted?
A bank auditor met with the senior operations manager to discuss a customer’s complaint that an auto loan payment was not credited on time. The customer said the payment was made on May 5, its due
An insurance company in Asia reported a profit of $100 million for the financial year 2015–16 through the news-dissemination system of the stock exchange where it was listed. Its stock price
For each of the following independent cases of employee fraud, recommend how to prevent similar problems in the future.a. Some customers found that the products of a prestigious brand sold at retail
Environmental, institutional, or individual pressures and opportune situations, which are present to some degree in all companies, motivate individuals and companies to engage in fraudulent financial
The computer frauds that are publicly revealed represent only the tip of the iceberg.Although many people perceive that the major threat to computer security is external, the more dangerous threats
A client heard through its hotline that John, the purchases journal clerk, periodically enters fictitious acquisitions. After John creates a fictitious purchase, he notifies Alice, the accounts
You were asked to investigate extremely high, unexplained merchandise shortages at a department store chain. You found the following:a. The receiving department supervisor owns and operates a
Why is computer fraud on the rise, and why is it often much more difficult to detect than other types of fraud? How does the U.S. Justice Department define computer fraud?
A teller at a savings and loan drive-through accepted a cash payment from customer #1 for an auto loan. The teller appeared to process the payment, but told the customer the printer was jammed
Do you agree that high penalty, such as reducing salaries or retirement benefits, is the most effective way to reduce employee fraud because the cost of dishonesty is excessive?
Which of the following control procedures is most likely to deter lapping?a. encryptionb. continual update of the access control matrixc. background check on employeesd. periodic rotation of duties
How vulnerable is the company’s computer system to fraud?
How can the company detect and prevent fraud?
Why did the company not catch these mistakes? Was there a breakdown in controls?
How was the fraud perpetrated? What motivated Don to commit it?
What constitutes a fraud, and is the withholding problem a fraud?
Explain how to prevent and detect computer fraud and abuse.
Define computer fraud and discuss the different computer fraud classifications.
Discuss who perpetrates fraud and why it occurs, including the pressures, opportunities, and rationalizations that are present in most frauds.
Define fraud and describe both the different types of fraud and the auditor’s responsibility to detect fraud.
Explain the threats faced by modern information systems.
What are the relative strengths and weaknesses of the different types (relational versus other logical models) of DBMSs?
Which DBMS products are based on a logical model other than the relational data model?
Which popular DBMS products are based on the relational data model?
With respect to relational databases, which of the following statement(s) is (are) true?a. A foreign key is only found in one table; it is not allowed to be in another table.b. When data about
With respect to relational databases, which of the following statement(s) is (are) true?a. The referential integrity rule ensures that there are no update anomaly problems with the foreign keys.b. A
With respect to database systems, which of the following statement(s) is (are) true?a. A subschema can prevent access to those portions of the database that do not apply to it.b. A report writer is a
With respect to database systems, which of the following statement(s) is (are) true?a. A record layout shows the items stored in a file, including the type of data stored and both the order and
With respect to databases and files, which of the following statement(s) is (are) true?a. There is a record in the data dictionary that describes each file in the database.b. The DQL is used to
With respect to data warehouses, databases, and files, which of the following statement(s)is (are) true?a. The database controller (DBC) is responsible for coordinating, controlling, and managing the
With respect to data warehouses, databases, and files, which of the following statement(s)is (are) true?a. Cross-functional analysis refers to combining master files into larger pools of data so more
With respect to data warehouses, databases, and files, which of the following statement(s)is (are) true?a. A problem with databases is data inconsistencies, as the same data is stored in two or more
With respect to data warehouses, databases, and files, which of the following statement(s)is (are) true?a. Analyzing large amounts of data for strategic decision making is often referred to as
Use the database depicted in Table 4-19 to answer the questions that follow.a. What is Date best described as?b. How many primary keys are there in this database?c. How many foreign keys are there in
You want to extend the schema shown in Table 4-16 to include information about customer payments. Some customers make installment payments on each invoice. Others write a check to pay for several
C&A Company wants to store employee skill data. Each employee may possess one or more skills, and several employees may have the same skill. Include the following facts in the database:date hired
Retrieve the S&S In-Chapter Database (in Microsoft Access format) from the text’s website (or create the tables in Table 4-5 in a relational DBMS product). Write queries to answer the following
Most DBMS packages contain data definition, data manipulation, and data query languages. For each of the following, indicate which language would be used and why.a. A database administrator defines
Describe what a tuple in a database is. What does it consist of, and what function does it have in a database?DISCUSSION QUESTIONS
List the four DBMS “languages” and describe who uses each and for what purpose.Discuss the ways in which a well-designed DBMS facilitates the three basic functions of creating, changing, and
Cornelia Cassidy is a telecom equipment sales representative. Her company has provided her with a laptop computer that uses wireless connectivity to access the accounting information system from
Which of the following is not a basic requirement of a relational database?a. Primary keys cannot be null.b. Every column in a row must be single.c. Foreign keys cannot be null.d. All non-key
Which of the following would managers most likely use to retrieve information about sales during the month of October?a. DMLb. DSLc. DDLd. DQL
The internal-level schema of a database system that consists of an individual user’s view of portions of a database is also called a subschema.a. Trueb. False
What is each row in a relational database table called?a. relationb. attributec. anomalyd. tuple
How do you query a relational database system?
How do you design a well-structured set of tables in a relational database?
What is a relational database system?
What is a database system, and how does it differ from file-oriented systems?
Describe what a relational database is, how it organizes data, and how to create a set of well-structured relational database tables.
Explain database systems, including logical and physical views, schemas, the data dictionary, and DBMS languages.
Explain the importance and advantages of databases, as well as the difference between database systems and file-based legacy systems.
Use the flowchart below to answer the questions that follow.REQUIREDa. What is the correct label for Shape 1 in the flowchart?b. What is the correct label for Shape 2 in the flowchart?c. What is the
Melanie is doing a study on various weight-loss plans and needs to determine an individual’s weight status by calculating his or her body mass index. To calculate a person’s body mass index,
The local college requires that each student complete an online registration request form. The system checks the accounts receivable subsystem to ensure that no fees are owed. Next, for each course,
Ashton Fleming has asked you to document the cash receipts system at S&S. Ashton’s narrative of the system follows:Customer payments include cash received at the time of purchase and payments
Ashton Fleming has decided to document and analyze the accounts payable process at S&S so the transition to a computerized system will be easier. He also hopes to improve any weaknesses he discovers
As the internal auditor for No-Wear Products, you have been asked to document the company’s payroll processing system. Based on your documentation, No-Wear hopes to develop a plan for revising the
Beccan Company is a discount tire dealer operating 25 retail stores in a large metropolitan area. The company purchases all tires and related supplies using the company’s central purchasing
Terrell and Monique Anderson run an antique store in their hometown of Verona, Italy.To find items to sell in their shop, they travel around Europe and Asia, buying unique artifacts. Within an hour
At the Barsus steel factory, employees have to enter their working hours on data input terminals and the job code for each project they work on. They enter the starting time and the time they stop
Prepare flowcharting segments for each of the following operations:a. Processing transactions stored on a sequential medium such as a magnetic tape to update a master file stored on magnetic tapeb.
Identify five important guidelines for drawing a flowchart. Which one would be the most important guideline to consider when preparing a flowchart? Support your choice with an example.
Give two reasons why it is important to have a working knowledge of DFDs and flowcharting. Explain your answer.
Discuss the ways in which information professionals interact with documentation tools and the various levels of understanding.
Identify the DFD from the following narrative: Henk buys a new bicycle at a local shop and pays with his debit card. The sales clerk enters the transaction in the cash register.At the time of
Which of the following statements is FALSE?a. A flowchart is an analytical technique used to describe some aspect of an information system in a clear, concise, and logical manner.b. Flowcharts use a
Prepare and use business process diagrams to understand, evaluate, and document information systems.
Prepare and use flowcharts to understand, evaluate, and document information systems.
Prepare and use data flow diagrams to understand, evaluate, and document information systems.
Which of the following statements is (are) true?a. An audit trail is a transaction path through a data processing system from point of origin to final output, but not backward from final output to
Which of the following statements is (are) true?a. Transaction data are almost always recorded in a ledger before they are entered into a journal.b. Documents are records of transaction or other
Which of the following statements is (are) true?a. A chart of accounts facilitates preparing financial statements because data stored in individual accounts can easily be summed for presentation.b. A
Which of the following statements is (are) true?a. To ensure credit sales policies are followed, the system can be programmed to check a customer’s credit limit and payment history.b. A transaction
Which of the following statements is (are) true?a. Input controls are improved by using pre-numbered source documents or by the system automatically assigning a sequential number to each
Which of the following statements is (are) true?a. Online batch processing is where transaction data are entered, edited, and processed as they occur.b. ERP implementation costs for large companies
Which of the following statements is (are) true?a. Using source data automation or well-designed turnaround documents and data entry screens helps ensure captured data are accurate and complete.b. If
Which of the following statements is (are) true?a. Source data automation devices capture transaction data in paper form at the time and place of their origin.b. General ledgers are often used for
Which of the following statements is (are) true?a. The data capture or input process is usually triggered by a top management decision.b. With sequence codes, items are numbered consecutively to
Which of the following statements is (are) true?a. Turnaround documents are company output sent to an external party and returned as an input document.b. Data is one of a company’s most important
You were hired to assist Ashton Fleming in designing an accounting system for S&S.Ashton has developed a list of the journals, ledgers, reports, and documents that he thinks S&S needs (see Table
Which of the following actions update a master file and which would be stored as a record in a transaction file?a. Update customer address changeb. Update unit pricing informationc. Record daily
On their websites, you will find several online demonstrations for the SAP and Oracle ERP systems. Visit these websites and explore their content by doing the following:a. Search the SAP site for
An audit trail enables a person to trace a source document to its ultimate effect on the financial statements or work back from financial statement amounts to source documents. Describe in detail the
Ollie Mace is the controller of SDC, an automotive parts manufacturing firm. Its four major operating divisions are heat treating, extruding, small parts stamping, and machining. Last year’s sales
Showing 500 - 600
of 5298
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
Last